Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-14310

Опубликовано: 31 июл. 2020
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 3.6
CVSS3: 5.7

Описание

There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.

РелизСтатусПримечание
bionic

released

2.02-2ubuntu8.16
devel

not-affected

2.06-2ubuntu18
esm-infra-legacy/trusty

not-affected

2.02~beta2-9ubuntu1.20
esm-infra/bionic

not-affected

2.02-2ubuntu8.16
esm-infra/focal

not-affected

2.04-1ubuntu26.1
esm-infra/xenial

not-affected

2.02~beta2-36ubuntu3.26
focal

released

2.04-1ubuntu26.1
groovy

not-affected

2.04-1ubuntu26.1
hirsute

not-affected

2.04-1ubuntu26.1
jammy

not-affected

2.06-2ubuntu7

Показывать по

РелизСтатусПримечание
bionic

released

1.93.18
devel

not-affected

1.193
eoan

ignored

end of life
esm-infra-legacy/trusty

not-affected

1.34.22
esm-infra/bionic

not-affected

1.93.18
esm-infra/focal

not-affected

1.142.3
esm-infra/xenial

not-affected

1.66.26
focal

released

1.142.3
groovy

not-affected

1.147
hirsute

not-affected

1.147

Показывать по

РелизСтатусПримечание
bionic

released

2.04-1ubuntu47.4
devel

not-affected

2.06-2ubuntu17
esm-infra-legacy/trusty

DNE

esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

2.04-1ubuntu47.4
esm-infra/xenial

needed

focal

released

2.04-1ubuntu47.4
jammy

not-affected

2.06-2ubuntu7
kinetic

not-affected

2.06-2ubuntu12
lunar

not-affected

2.06-2ubuntu16

Показывать по

EPSS

Процентиль: 21%
0.00065
Низкий

3.6 Low

CVSS2

5.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.7
redhat
почти 5 лет назад

There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.

CVSS3: 5.7
nvd
почти 5 лет назад

There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.

CVSS3: 5.7
debian
почти 5 лет назад

There is an issue on grub2 before version 2.06 at function read_sectio ...

github
около 3 лет назад

There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.

CVSS3: 5.1
fstec
почти 5 лет назад

Уязвимость реализации функции read_section_as_string() загрузчика операционных систем Grub2, позволяющая нарушителю оказать влияние на целостность данных или вызвать отказ в обслуживании

EPSS

Процентиль: 21%
0.00065
Низкий

3.6 Low

CVSS2

5.7 Medium

CVSS3

Уязвимость CVE-2020-14310